Datacenter.com, a worldwide producer of the cloud data services has won an excellence prize from the European Datacloud for its unique data architecture facilities design due to its exceptional secur..

Today any business is dependent on the Internet. And the Internet is dependent on IP addresses. In spite of all the ongoing work on the popularization of Ipv6 by RIRs for the present day the Internet ..

Once IBM has increased the performance of 6th generation X series servers by connecting solid-state storage to the memory channels, they want to do the same for the data centers. They released storage..

Dell company has started 2018 by expanding its PoweerEdge server line and presented XIV generation with 3 new high-performance computing servers — R6415, R7415 and R7425. According to the president of..

Underground "nuclear" data centers have been used to store data for decades. Recently, underground bunkers became a growing niche in the world of data centers.
Company Iron Mountain as the well-known ..

Despite the excess of information on the Internet and at various events, many still for some reason still equate the cloud with the dedicated server. They really have common fundamental similarities. ..

The terms "digital production", "industry 4.0", "smart factory" are often used as synonyms, but in fact all these concepts designate one trend: to replace work of worker and the machine separately on ..

Despite Facebook's problems with the governments of the countries on both sides of the Atlantic, the company announced plans to expand its server capacity in Sweden, namely, the plan for the construct..

If you or your company needs IPv4 resources what options do you have? There are 2 basic options. Many choose leasing IPv4 addresses routed on a server in many data centers all around the world. It is ..

The last quarter of 2017 showed the strong growth trend of the client base of Google, therefore its parent company Alphabet will direct its cash flows to the expansion of infrastructure, namely, on bu..

The net profit of the US telecommunications company Cisco in the third quarter of 2017-2018 fiscal year amounted to more than 12 billion revenue and showed growth relative to last year by 4%. The mana..

The large hosting provider Hivelocity started cooperation with AMD and introduced the line of Instantly Deployable Dedicated Servers on the basis of new EPYC processors. Servers with a new architectur..

The actions of Roskomnadzor regarding the blocking of the Telegram messenger on the territory of Russia have not yet led to the result expected by the agency. Thousands of websites have suffered, dome..

In March 2018, Intel announced that it was continuing to work on protection against Meltdown and Specter. In addition to the released "patches" for existing processors, the company intends to rework t..

In May 2018, Europe switched to the updated rules for processing personal data, established by General Data Protection Regulation. The new regulations provide EU residents with the tools to fully cont..

The Internet of things is a mass application of all sensitive elements that are equipped with chips and are able to communicate using a dedicated IP address. According to researchers who study the Int..

Forecasts say that in 2018, the total amount of data that is "contained" in the data centers will reach 1450 eB, and in this area there are own trends are being formed, which you need to know.
HDD re..

Cooling is one of the most expensive items of operating costs of any data center. With the increased use of servers for high density cloud services, the temperature issue has become even more expensiv..

The long-standing need of many companies in the universal and autonomous data processing unit have come true. The micro-modular data center is a computing platform consisting of several racks with IT ..

Norway since 2015 is experiencing a "boom" in the building of new data centers, especially large ones. Prior to this, the country mainly built medium and small data centers, although there were a coup..

In 2018 the company with 50 years of experience in creating storage solutions, Fujitsu, presented on the market the updated ETERNUS hybrid data storage system. This system gives a level of reliability..

Owners of DC are always interested in reducing the costs associated with its operation. They invest money in technology development, in newest power supply systems, liquid cooling of servers and so on..

This is a question that worries many people: those who already have their own website and those who are just planning to launch it. It should be noted that in the network you can find hundreds of diff..

Sometimes a company or an individual person has N + 1 domains. Naturally, you want them to work and have a connection with each other. This is useful for example when your company has a multi-segment ..

Information protection is one of the condition of data center functioning. Therefore, it is necessary to assign different levels of access to users to protect information. Usually, several levels of p..

Since 2015, the Chinese authorities announced the beginning of a large modernization of Internet structures project in the country. $ 182 billion will be spent on new fiber-optic networks, as well as ..

Average losses from DDoS attacks are estimated around 50 thousand dollars for small organizations and almost 500 thousand dollars for large enterprises. Eliminating the consequences of a DDoS attack w..

Analytical reviews of the IaaS market says that it will not slow the growth rate for another 3 years until 2021. It is expected that its capitalization will be 85 billion dollars. Another trend will b..

In Australia, the National Broadband Network (NBN) project has been developed for several years. Its goal is to provide high-speed access to the network of the overwhelming number of residents of this..

Holidays are a special time for many areas of activity. For some companies it's a dead season, for others it's an opportunity to earn extra profit. People who are working with sites and hosting and in..

South Korean company Samsung announced the launch of the world's largest capacitive solid state drive - 30 TB model SSD PM1643. The system is based on 512Gb V-NAND memory. According to representatives..

In Japan, there is a graphic language for ideograms and emoji, which is adapted for use on web pages, when communicating in social networks and through smartphones. Some emoji characters were included..

The Natrick project from Microsoft dipped a modular DC in the coast of Scotland, which is expected to work there at the depth of more than 35 meters for 5 years without lifting to the surface. Communi..

On the next day after the presentation of the new top Intel processor with 28 cores, AMD presented its solution - 32-core desktop processor Threadripper 2 series Ryzen. This time the company managed t..

The nature of global threats to security systems is changing every year. According to forecasts, angry customers will put pressure on governments, demanding tougher legislation on data protection, and..

Russian IT company Kaspersky Lab intends to open a data processing center in Switzerland. It would seem that this news is not surprising because Switzerland has been a magnet for foreign companies for..

For a long time, Intel allocated only 4 cores for desktop servers, but AMD in 2017 led the race over this number. At Computex 2018 in Taipei Intel demonstrated an even more impressive product: a 28-co..

The equipment load in the DC has increased by 10 times over the past 10 years. This is primarily due to the fact that almost all hosting providers in the pursuit of the SLA indicator 99.9% minimize do..

In December 2017 IBM released AC922 servers of the new generation based on Power9 processors, adapted to work with artificial intelligence, machine learning, and also for working with cloud environmen..

A new type of storage memory, which is now available for use in data centers, significantly reduces latency and latency of processors and repeatedly accelerates the process of saving and retrieving da..

This question is sooner or later is asked by any startup. The answer in each case will have to be looked for independently, to evaluate the pros and cons, to estimate the risks and to consider the bud..

Although providers with their own data center have certain advantages, including more control over the infrastructure, the disadvantages of this approach often outweigh. This is the need for large ini..

Fujitsu and Huawei are starting the race to develop their own chips for solving problems related to AI. As Huawei’s CEO Yu Chengdun told on China Internet Conference 2017 company is not going to relea..

The nature of global threats to security systems is changing every year. According to forecasts, angry customers will put pressure on governments, demanding tougher legislation on data protection, and..

If you have already bought equipment
It often happens that a new IT director was appointed in the company and sees that six months ago his predecessor had already bought equipment, it is still on supp..

The turnover of the Big Data market will continue to grow this year with a 15% growth rate. More and more companies are convinced of the efficiency of use and the ability to generate information usefu..

Modern server equipment strongly depends on the temperature mode it operates in. Overheating of the processors leads, at best, to a slowdown. In the worst case, overheating can completely disable the ..

In 2017 Lenovo introduced a set of products and solutions for building the computing infrastructure of the data center based on the x86 architecture. The set includes servers, storage, network devices..

Study Group 20 of the International Telecommunication Union has created a migration plan from v4 to v6. It is designed as an instruction and step-by-step plan. The first version of this document descr..

Some use the clouds because of flexibility, other want to get away from routine, the third needs centralization, the fourth one needs security. However, the clouds are not only convenient, but also be..

Many believe that edge computing is stimulated by the needs of the Internet of things (IoT). But it has a much wider application. SaaS and clouds need more advanced infrastructure. Modern SaaS applica..

Cloud providers have been increasing purchases of infrastructure equipment for several quarters in a row, and the first quarter of 2018 was no exception. Analysts calculated that during this period, p..

The forecasts of the size of the cooling water market for computing equipment confirm that by 2023 its size will reach $ 5 billion. One of the main reasons for this is the simple extensive growth of t..

DCIM-solutions that monitor the work of data center environment have become mass-scale only with the growth of both the date of the centers and the industry itself. Now the development of DCIM-solutio..

The Chinese initiative Made in China 2025, which aims to reorient the country from copying and adopting technologies to their own development, supported the Hygon manufacturer and their x86 processors..

Quantum calculations are the point of interest not only for such technological giants as IBM, Google, Microsoft or Intel, they are interested in EU, Russia, China, the United States and Japan. The sta..

Conservative in its essence, the market of corporate data centers has remained so for last decade, but over the past few years there has been a shift. The work of applications in the cloud environment..

After a series of scandals associated with the Specter and Meltdown, OEMs decided to deal with vulnerabilities at the hardware level. Accelerated Memory Scanning will be one of the solutions Intel is ..

Digital counterpart for a business do not have a clear definition, according to Forrester Research center, but this the theme is constantly rising. The analytical company proposes to consider the digi..

The razzle around the concept of big data is gone into decline, but many companies are still having strong interest for the analytical processing of big data (like Hadoop or Spark technologies). These..

Trust to the staff contributes to direct savings in corporate spending, as well as strengthening the image of companies: in companies with a digital workspace, 20% of software for solving business pro..

The overwhelming majority of experts believe that software is the key element of digital transformation. If previously it was intended for data management, now the data itself starts to manage the sof..

High reliability of modern data centers allows owner to focus on its effectiveness. This is important both for their owners (serves as a basis for reducing costs), and for consumers of data centers (p..

Technology and IoT are developing faster than ever, but even in such a flexible world as the world of IT, something remains unchanged: the increase in the use of IPv6 instead of IPv4 practically tends..

The capitalization of companies that have been trading on HACK stock exchange for the past half of 2018 increased by 18%. HACK includes holdings that provide popular solutions for information security..

Before trying to ensure the maximum uptime of the project, it is necessary to correlate the costs and the cost of downtime. Usually, this is very important for companies which are depended from other ..

Experts of the consulting company Deloitte implemented a study and expect that by 2021 the world expenses for the Internet of things (IoT) will reach 1.4 trillion US$ and the number of connected devic..

One of the dynamically developing direction of the cloud services market today is the so-called hybrid clouds. The main advantage of this service is the opportunity to seriously save on the costs of d..

Analysis of trends in virtualization shows that a number of virtualization-based technologies have passed the phase of experimental implementation and are preparing to become commercial products.
Serv..

In mid-July, Google's cloud technology division announced the beginning of work on the first private transatlantic underwater cable - Dunant. "Private" in this case means that the whole project is imp..

AI has plenty ways of use. Companies that develop automated, self-learning networks based on AI have identified and presented on the eWeek portal five areas for network administration that AI in which..

It is strategically important for business owners to use Internet technologies with maximum benefit. If you made a website or an application, today ше alone will not be a competitive advantage. Busine..

Experts for a long time can not agree on which of the two technologies is more secure. If you do not take into account the generally accepted dogma, "a virtual machine will always be more reliable," a..

Some time ago one of the hot trends was the use of SSD-drives connected to the PCI Express bus using NVMe technology, which provides good efficiency and low latency. Today new point of growth will be ..

IDC expects that next year the expenses on digital transformation, including equipment, software and services, will approach 1.3 trillion. This is 16.8% more than the estimate for the current year, eq..

There can be a hundred or so monitoring systems in the world. It could be and cloud systems, on-premise, and on payment basis, free, for the network, infrastructure and so on. Among them there are tho..

Automation is very important
To manage infrastructure one of the most important elements of success is well-established monitoring. Since manually monitoring such a number of servers is physically imp..

In a classic HDD, the actuator with magnetic heads has a one-piece design, so all the writing / reading heads rotate synchronously. Seagate's Multi Actuator technology divides the actuator into two bl..

Organization USB 3.0 Promoter Group, which oversees the development of specifications for the USB 3.0 standard, reported a significant update of the specifications of the interface with the same name...

Today we are going to look through Lenovo DS6200 line with convergent controllers, 16 Gbps FC transceivers and 24 solid-state drives of 3.84 TB each. The repository has a number of the following indic..

An outpacing increase in the importance of the information constituent of the systems in comparison with the actual computing component is one of the key trends in IT development. But on the way to im..

The critical increase of servicing the corporate network cost (according to experts, today it is three times higher than the cost of the network itself), as well as the urgent need for rapid configura..

In today's article, we'll note some of the biggest security threats and talk about how IaaS providers protect customer data.
Data loss
You can lose data in many ways: it can be damaged by intruders, a..

Vice President of Gartner company said in a corporate blog that by 2025 80% of enterprises will close their data centers. For comparison, today only 10% of companies refused from using own equipment. ..

As you know, Intel has some problems with the transition to 10-nm process technology. Literally last week it became known that the finished systems based on 10-nm Intel processors will appear in stock..

Enterprises that are ready to migrate to the clouds have hundreds of questions. And most often is this: which option is better to use? Transfer, using another platform, refactoring? The reality is tha..

The modern IT infrastructure of the enterprise can not be compared to the one that existed several decades ago. Mainframes, locally deployed software - all this is a thing of the past, and they are re..

If in 2015 the company placed in the cloud only 10% of infrastructure and computing capacity, now some of them have 90%, but it was not easy to achieve this. On the way to the goal, the company will f..

The trend of the transfer to the cloud is at full blast, therefore, both large and small companies are trying to follow it, believing that the transfer of computing resources and data warehouses to pu..

Let's start with the fundamental question: what exactly is the reason for the unstable operation of our site? What makes the site unstable?
1. Accidents related to releases.
2. Errors of administrator..

For many years, Internet users viewed the IPv6 protocol as a way to speed up network traffic and address the pending problem of the exhaustion of the network address pool. However, although many IT ma..

The management of IP space and distribution is carried out by the IANA Internet address space administration and regional Internet registrars (ARIN, APNIC, AfriNIC, LACNIC, RIPE NCC). In early 2011, I..

As follows from the new functionality of Citrix Systems products, the company sees the main centers of application of its efforts in developing technologies that affect the transformation of workplace..

When we talk about the reliability of IT systems, we should not limit ourselves exclusively to network security issues. There can not be trifles here - everything matters from the quality of equipment..

Failures on the side of an IT infrastructure provider can occur for a variety of reasons. For example, even with a point error while updating the firmware of one of the technological elements. On the ..

Buy a hosting or rent a server in China is not more difficult than doing it abroad. The only and basic problem you will face is obtaining an ICP license. In short: if you buy a hosting / server in Chi..

The Pangnote platform was developed by our team in order to centralize the search for offers of hosting services and IT infrastructure. Pangnote is offeringing services and collect information not onl..

Most Internet users believed for years that the forum is the best tool to find services/products. And it is only natural that new platforms for searching for services are now replacing forums. Our Pan..

14 August 2018

Why Pangnote a roaring Hosting services exchange and does not look like a forum

For a user who needs to lease a dedicated server it is critically important to find not just a financially profitable offer, but also a server that will work correctly with minimal control from user`s..

When looking for a cloud or VPS, there are so many parameters affecting the decision making. The basic will be such as connection speed, price, location, reliability of the data center, technical supp..

On the stage of developing our platform we set ourselves the goal of creating a tool to find a solution to the purchase-related services in the hosting industry. We are oriented not only on users but ..

Many organizations or users are facing with the need to place their equipment in a remote data center. The choice of such data center is a particularly important task, because you are not only choosin..

The first single-phase models of UPS on lithium-ion batteries appeared in the Schneider Electric portfolio as far back as 2013. As technology has improved, the company has returned to Li-ion solutions..

For providers, operators and large companies that need a reliable and high-speed global Internet connection, we have created a section on Pangnote where they can find the IP transit service. The secti..

According to official statistics for 2018, there is more than 4.5 thousand hosting providers in the world, and for non-official this number is at least twice bigger. Given that hosting as a service is..

Our team strives to create a consumer-oriented platform for hosting services, so we need a link between companies and users. Each user has unique requests or requirements. Therefore, your view and alg..

Gartner unveiled the state of the global server market in the second quarter. According to their information, serve`s supply will reached 2.8 million units, which is 2.4% more compared to the same per..

By 2020, global expenses on blockchain solutions will exceed $ 9.7 billion, IDC predicts. For the period from 2017 to 2020 the average annual growth in costs (CAGR) will reach 73.2%. This year, total ..

You can avoid problems with backups if you follow several simple rules. There is nothing complicated. We ourselves try to fulfill them, and, it is necessary to tell, it works. At once we will tell tha..

The former monitoring tools are significantly different from modern ones, using cloud computing, analytics, and mobile applications. By analogy with the popular term "digital transformation" we will r..

As a result of the conversion of companies to the use of several cloud providers and the use of large data in critical applications, disaster recovery plans (DRs) should be revised, and possibly sent ..

The JEDEC Committee for Engineering Standardization of Semiconductor Products governing to the establishment of memory standards, announced that the development of the new DDR5 standard has already be..

RIPE NCC, in its report "Statistics of IPv6 implementation in the region," said that currently 45% of all LIRs do not have IPv6 at all, some IPv6 addresses are allocated, but this does not mean anythi..

Traditional threats to the security of data centers, related to infrastructure, construction and operation errors, will continue to lead in the near future, but now we must pay attention to the risks ..

Consumers want to have connection with business right anywhere and anytime. Currently, more than 50% of global traffic is generated by mobile devices, and customer service on many online sites is now ..

In order to do business, you need a strategy. Below, data center operators are offered some scenarios that should be adhered to and avoided.
What you should not to do
Talk to IT specialists in differe..

Almost all infrastructure engineers aware of the fact that allocation of IPv4 addresses have stopped almost in all the world (except Europe and Africa). So our platform decided to help ISP and other c..

It's no secret that the RIR used to allocate blocks of IPv4 addresses for almost all members with a large margin. Now the number of the IP resources that have been reserved and allocated is almost exh..

Pangnote platform monitors trends in the hosting industry and connectivity. Our users have faced with the need to lease IPv4 block subnets s either for their temporary project or when migrating to a n..

There is an Internet infrastructure that includes switches, routers, which require a fairly large number of IP addresses, as well as server addresses. For some applications, for example sites that use..

It's no secret that the Internet is developing quickly, so it's no surprise that the latest free address blocks /8 (IPv4) were distributed by the IANA between regional registrars in 2011. The last blo..

Before Microsoft's purchase of more than half a million IP addresses have not considered by Internet registrars as objects of sale, because it is neither an intellectual property item nor network traf..

Internet companies, and all representatives of the corporate sphere, faced the expected, but still extremely embarrassing problem: the pool of free IP-addresses is exhausted. As a result, companies wi..

IPv6 was created to solve the problems that IPv4 can not handle. First of all, this should happen due to the use of address numbers 128 bits instead of 32. After the IPv4 address space is over, the si..

Exhaustion of IPv4 addresses is affecting all Internet users. The inaccessibility of IP addresses means, in a sense, that the Internet is almost at full capacity and communication with new network dev..

No one could have guessed that the Internet would become so popular, and to date, with approximately 2.5 billion users, IPv4 addresses are simply catastrophic. Promotes descending addresses of the gro..

The process of selling IP address network for many companies will be a novelty and will cause quite a few questions. so many prefer to use the services of brokers. It is these intermediaries that have..

Statistics shows that every hour there are more than 1 thousand of new users require for additional IP addresses, as in the case all hosters and ISP have big problems. They basically have 2 options: t..

If you faced with lack of IP addresses, then you can become LIR yourself and get a one-time / 22 (1024 addresses) RA network allocation, an IPv6 / 29 block and an autonomous system. For this, you in y..

What for?
Increased capacity of the addresses by using 128-bit addresses instead of 32-bit is the most important feature of the new-the IPv6 protocol. The goal of IPv6 implementation is simple: their ..

Having the right strategy is the key to the successful sale of IPv4. You must control the sale from the very beginning of the process until you receive payment, and the buyer get all rights. You know ..

Many companies are considering the possibility of renting IPv4 addresses, while they on the stage of systems migration on IPv6. This step can be a more acceptable option for several reasons. Firstly, ..

Any computer connected to the Internet, have to be assigned a unique (in global terms) digital combination, called IP-address. This allows the various programs operating in the network, to work togeth..

Ten-year forecasts about the possible exhaustion of IPv4-addresses has become a reality. In the United States, the range of Internet addresses based on Internet Protocol version 4 has already been exh..

IP broker is useful for organizations that are members of Internet registrars to find and organize the transfer of IPv4 address space. IP broker decides how he will do it. RIPE will not participate in..

The lease of IPv4 blocks is targeted specifically to meet the needs for IPv4 addresses of companies and enterprises operating in mission-critical IT systems and networks that should not be compromised..

AI gives administrators in the data center recommendations on how to optimize server power consumption. The solution reduced energy costs for cooling systems by 40% and reduced the PUE by 15%.
Accordi..

Most customers, even if they have fault-tolerant virtual machine clusters, and do not perform regular backups regularly, do not pay enough attention to the DRP. And faced with some serious malfunction..

OpenStack continues to conquer the corporate environment. At present, the complex, which unites several Open Source projects and serves the creation of infrastructure of cloud services and cloud stora..

According to estimates in 2015, the turnover of the world market of engineering infrastructure leasing reached 27 billion dollars. In the next two years, the growth of this segment of the market conti..

The new manager
Kurt Pritz, former senior vice president of ICANN, is expected to be appointed chairman of the Expedited Policy Development Process Working Group (EPDP), that has task is to reform Who..

Digital transformation and favorable macroeconomic conditions give a good impetus to information technology vendors. World IT spending is growing because of many factors that overlap each other, such ..

According to forecasts of experts by 2020, almost half of all companies that are locating their equipment in data centers will use cloud models. A hybrid model is a fundamental concept for consuming a..

Everyone says that they learn from mistakes, but sometimes these mistakes can lead to very large losses. Therefore, your attention would like to introduce a few common mistakes that are allowed when c..

Lithuania is a small country (only 3.3 million inhabitants), but after joining the EU, the telecommunications market has started to develop very actively. Optical networks appeared in all major cities..

The revival of autonomous computing is a step towards the construction of SDDC. Today, the stage of widespread introduction of virtualization in the data centers has already been completed, the introd..

In the line of Cisco servers, the first server appeared to work with loads in the field of AI and machine learning. The use of these new technologies opens up new ways of solving complex problems for ..

Today we will discuss the model of the rendering of services by Equinix, which has more than 180 DCs. If you believe the analysts Equinix's revenues in the colocation market are pushing up, one of the..

Let's look at the advantages of hosting in the US and the reasons why more owners/developers prefer to place their projects overseas.
About 110-15 years ago the phrase "hosting provider" in the countr..

The length of the domain name is important, but it is no more important than readability, experts say. Yes, short domains help to improve SEO-indicators, but in the conditions of growing popularity of..

In this article, we will examine the cases with which almost all providers of VPN services are facing.
1. VPN as a service that requires increased security
When a customer buys an Internet radio, the ..

The server market review for the first half of 2018 showed that the volume of shipments on the server market grew by 4.3% compared to the previous year. If we consider the market in unit terms, then s..

The colocation service allows small and medium-sized businesses to rent a place for the safe placement of their equipment, where it will be provided with reliable power and cooling, as well as communi..

Data center as a business is firstly providing infrastructure for rent, secondly the procedure for rendering services on this infrastructure to customers of this data center as a business. Proceeding ..

Today, there are several options for placing IT infrastructure for business. All of them have their own pros and cons, about each there is enough information of varying degrees of relevance.
First opt..

The international certification center for data processing centers Uptime Institute in the newest poll revealed an unpleasant trend. According to the largest survey of specialists from 900 data center..

In the village of Trimley, St. Martin the slowest Internet in the whole UK (as of December 2017) is 0.68 Mbps. Of course, in developed countries such problems exist only in sparsely populated areas. F..

How to evaluate the speed of a site? In most cases, this happens subjectively: for example, the owner or developer considers that the speed is acceptable and not intended for the rest of the audience...

The entertainment that the audience enjoys today is the result of the progress. Today video imposes higher demands on the IT infrastructure. New solutions and equipment that transform data centers all..

Despite the fact that technically the cloud provides rapid computational loads and an equally rapid scaling of storage, for many companies there are good reasons for purchasing and installing local se..

Synergy Research has published a new study on the cloud services market (IaaS, PaaS and SaaS) which, in addition to indicators for individual market segments, refers to the trend that affects the mark..

Samsung Electronics intends to take advantage of the opportunities that will open after the commercial introduction of 5G technology in 2019. The South Korean giant is increasing investments in its te..

Who are they?
These are people who today rarely see computers. Their first contact with the network will be via a mobile phone. Most likely, the first thing that they are waiting for are popular messe..

Uptime Institute has introduced its new data center evaluation and certification system, called Efficient IT Stamp of Approval. The program was called "Tier-ready" which relates both manufacturers / s..

The network identified an automated mass attack, hitting sites developed on WordPress, which is used by about 30% of the ten million largest sites. During the attack, sites with an unrefined engine ar..

Cisco is actively developing an ecosystem of hyperconvergent technologies. For example, in October last year the company announced a partnership with Google. IT giants will provide a joint solution fo..

RAM will be cheaper than analysts expected. According to the experts' expectations, the contract prices for DRAM-memory chips in the fourth quarter of 2018 will drop by 7% compared to the previous thr..

The appearance on the market of server hardware of EPYC processors with Zen architecture allowed AMD to restore itself as a main competitive supplier of Intel Xeon processors. Prior to this, over the ..

Intel, which has a 90% share of the global processor market, is taking steps to increase the production of its CPUs and mitigate their deficit, which PC brands and their ODM partners have recently bee..

New SSD
The Japanese company Toshiba has introduced a new SSD for data centers. The CD5, XD5 and HK6-DC models are designed so that the data center can work with high performance and workload processi..

At the end of September, at the 2018 Xi'an Netcom Military-Civilian Integration Forum conference, where the integration and collaboration of Chinese military and civilian specialists were discussed, t..

About the plans of AMD to release before the end of this year a new Polaris graphics processor and a video card based on it has been known for quite some time. Now the sources in the ranks of video ca..

Intel has presented a new generation of high-performance Core-X processors. This generation is named Basin Falls Refresh, although Intel itself ranks it among the Skylake-X family.
In the new generati..

Intel has again postponed the release of 10-nm chips this time until 2019. Last month it became known that the company plans to go "further" and return to the 22-nm process technology.
Intel planned t..

Iridium and Amazon web Services are going to create their own global network satellite infrastructure. The objectives of the project are quite specific. The network itself is being developed to expand..

About 80% of cases of companies’ with less than 200 users migration account for the transfer of an already virtualized infrastructure from the local server to the data center, the remaining 20% ​​is t..

In China, Huawei introduced a proprietary AI processor. Earlier, Huawei released the specialized accelerators of AI and machine learning Kirin 980, which, in particular, have found application in smar..

According to Google statistics, the total number of IPv6 connections to the company's servers as for October 2018 exceeded 25%. Considering the mass nature of Google and the company's presence in all ..

LTO company presented new tape storage system. As it has been repeatedly noted, being one of the first storage devices in early computers, they have not became analog in the 21st century. Thus, the ca..

Concern Avtomatika started mass production of Russian high-performance Elbrus 804 servers. The devices are designed to build computing clusters, work with applications and databases. Consumers of new ..

HP has announced the release of desktop computers based on the new Coffee Lake Refresh processors with RAM value that can reach 128 GB. This is twice as much as was available in previous-generation In..

In October 2018, the Cisco SD-WAN solution was officially presented, using innovative technologies of the innovation-oriented networks. SD-WAN technology is designed to create scalable distributed cor..

Electrotechnical giant Schneider Electric has introduced a new series of economizers for Ecoflair data centers. These high-performance cooling systems have replaced EcoBreeze devices.
The new version ..

CyberPower has updated and completed the HSTP series of three-phase uninterruptible power supplies with high overload capacity. The HSTP series is represented by monoblock models with capacity from 10..

IPPON company announced the update of the line of uninterruptible power supplies IPPON Innova RT II series. The novelty is designed to protect expensive equipment, servers and other IT systems. The ne..

ASUS has officially unveiled the Maximus XI Apex motherboard. The novelty is one of the most advanced ASUS motherboards on the new Intel Z390 chipset, and it is targeted primarily for overclocking.
To..

Delta Electronics supported by the American Green Building Council, has developed and built data center with LEED v4 ID + C Gold certification in Wujiang City (China). Delta's goal is to create eco bu..

The company AppDetex appealed to the management of the ICANN corporation with a letter in which it complains about the actions of domain registrars. AppDetex itself is an ICANN-accredited registrar, b..

Over the past few years, the overall power density (kW per rack) in data centers, both corporate and commercial, has increased significantly. Ten years ago, a typical server cabinet consumed 1-2 kW, a..

NVIDIA partners, specializing in the producing of discrete video cards, have launched the announcements of the first GeForce GTX 1060 6GB accelerators with GDDR5X standard buffer memory. Initially it ..

Intel has shared its plans for the release of 14-nm server processors Cascade Lake-AP. In addition to the older models of the AP series, simpler CPUs with an SP index are expected, as well as enthusia..

As you know, there is now a shortage of Intel processors, caused by certain mistakes in strategic planning. For this reason, the cost of processors has been growing for several months in a row and in ..

Over the past few years, Cisco has consistently developed in its product implementations the concept of transition from managing individual network devices to automated network management as a whole, ..

Analysts of DRAMeXchange noted that in beginning of the fall contract (wholesale) prices for DRAM memory chips and DDR4 memory modules. The growth in contract prices for memory was observed for nine q..

Seagate has published its road maps. According to them by 2025, Seagate plans to launch hard drives with a capacity of 100 TB. The currently used perpendicular recording technology (PMR) allows for a ..

Seagate and IBM announced their plans to create a global tracking system for hard drives. To do this, it was decided to use the blockchain technology, which guarantees the highest degree of protection..

Initially, the idea of using SSL was to create a secure communication channel for the transaction path between the user and the server. Certificates work on the principle of exchanging unique keys tha..

In April 2017, there were 320 hyper-scalable data centers in the world, and in December their number was 390. Synergy expects the number of hyperscale data centers to increase to 400 in the first quar..

AMD has shared its plans for the future. Road maps were published showing the company's plans for the development of server processors, processor architectures and GPU-based computing accelerators.
So..

The DNS protocol does not encrypt user requests to the server and the responses to them. Thus, queries contain the names of the hosts that the user is visiting. From here it is possible to “overhear” ..

There is a huge number of instruments and solutions to create an online store. These are both proven site management systems and rapidly developing web resource designers. What to prefer and in order ..

So far, marketing department is coming up with new promotions, offering to buy five for the price of one the task of the company's IT department to make sure that this whole holiday will not be spoile..

5G technology will provide ultra-high speeds and almost no delays. Companies especially expect that 5G will allow them to simultaneously run more bandwidth-intensive applications. But you should not i..

The strategy for backup should be well thought out and take into account risks depending on the severity of the failure. In other words, you will need to go beyond the simple static accumulation of sn..

One of the main problems of the current state of the global network is the exhaustion of the IPv4 address space. Many of providers already have implemented in its network access to the Internet using ..

The Internet Commerce Association (ICA) has asked ICANN to intervene in the situation around the .COM domain zone. This was due to the fact that the US government allowed VeriSign to raise prices for ..

Over the past 15 years, much has changed in the data center. In the early 2000s, cabinets were usually 42U height, covered with a glass panel in front and behind. The average energy consumption was ab..

According to published by Ministry of Industry and Information Technology report data center capabilities in major cities in the east, west and northeast of China are exceeded in all respects, while t..

Usage of social networks and usage of the Internet for knowledge is responsible for much of the growth of data volume. What technologies are responsible for the growing demand for data and space nowad..

Supermicro demonstrated the XU SuperBlade 8U universal solution that offers up to ten full-size blade servers with four processors each and up to twenty half-height blade servers with pairs of process..

Historically, data centers used to be spacious rooms at the dawn of the computer industry, which housed huge computers that had complex systems, high power consumption, a lot of wires and plug-in comp..

Although SaaS and other cloud services are now widely available on the market, many organizations still use outdated hardware platforms and software. Every year their support causes more and more diff..

Synology has officially presented the RackStation RS1619xs + network storage, information on the preparation of which appeared in the summer of 2018. The device is designed for rack mounting: the solu..

The University of Binghamton (New York) have developed a new technology for cooling processors, which will allow to abandon the thermal paste. Thermally conductive material is applied directly to the ..

The ICANN meeting in Barcelona in October 2018 discussed the possibility of eternal domain name registration, in which the client pays for registration only once, and the domain remains with him for l..

Now in Europe, the ePrivacy Directive directive, which was adopted in 2002, meets the requirements for regulating the mechanisms for handling personal data of users. It is because of it that site owne..

The main event of the spring 2018 can be named the massive blocking of various Internet services in Russia. About 2 million AWS IP addresses, over 1 million Google addresses and 130 thousand Azure IP ..

Three years ago, the young Californian company Nautilus Data Technologies made a proposal to place data centers on floating barges, more precisely, on barges parked at one or other berths. This remove..

Head of Core and Visual Computing Group presented the world's first hybrid x86-compatible micro-architecture. It sounds too hastily, but it looks interesting and promising. In fact, Koduri spoke about..

In 2019, advances in artificial intelligence and machine learning, driven by an ever-increasing amount of data, will have a tremendous impact on technology and security. Migration of enterprises to th..

According to research firm Sandvine, there is a worldwide change in the structure of network traffic: the share of video content increases significantly in all regions. According to the analytical rep..

VIA was very well-known manufacturer of chipsets and earlier of CPU and now is not in the best financial statment, and there is little news about the company. However, the company is functioning and e..

Even in a global economy, the authorities of any country are obliged to protect the local producer. At one time, for example, South Korean authorities helped subsidize Hynix, when other memory manufac..

In developed countries, 5G will reach a critical mass by the middle or by the end of 2019 (when technology becomes viable and will be interested for consumers). But only in 2020 or later will it becom..

American researchers replaced lithium in batteries with a special material based on magnesium, and got more reliable and durable batteries. In the future, their development may reform the basis of all..

Solutions for the deployment of modular DC from Huawei are designed for all the necessary architecture, allowing you to add uninterruptible power supplies, power distribution system and racks. In addi..

The crisis of free IPv4 addresses exhaustion divided the network community into two camps: conservatives, IPv4 supporters, and innovators actively promoting for IPv6. A representative of the leadershi..

In mid-December, the Federal Communications Commission approved the LeoSat satellite Internet project. The network will begin to deploy in 2019. The LeoSat network will consist of 78 satellites. They ..

The German company WestfalenWind Group (an operator of turbines for generating electricity using wind) proposes a project to install data processing centers in the turbine masts. The WindCores project..

Like all other leaders of the information technology market, a few years ago, the Chinese IT giant Baidu took on the development of platforms with elements of artificial intelligence. For Baidu, as fo..

Traffic interception through BGP vulnerabilities
Recently, vulnerabilities have become more frequent in the BGP Internet routing protocol. Intercepting and redirecting traffic allows you to analyze an..

The NVM Express protocol was greeted by the data storage industry very warmly, since previous SATA and even SAS protocols required compatibility and a common drive orientation with hard drives. Despit..

In 2017 Fujitsu and Huawei started to work on AI processors manufacturing strategy. The Chinese company has been developing mobile processors for many years. The development of its own chips allows i..

We have prepared a mini-selection of technologies that are being worked on in the most advanced institutions of the modern world and which are capable of making several revolutions in the field of hos..

Following IBM, Microsoft, and Oracle, Hewlett Packard Enterprise unveiled its first product from a future family of offerings, combined under the name HPE Mission Critical Blockchain. According to the..

The demand for hard drives in the IT industry is reducing, and data centers are increasingly using solid-state drives. Can the HDD disappear from the data center in the near future?
Trends in the stor..

Micron Technology and Intel presented the next fruits of their cooperation in the form of 64-layer 3D NAND QLC flash memory chips, storing four bits in one cell. The capacity of a single chip is 1 Tbi..

We have already described one of the ICAAN initiatives related to lifelong allocation of a domain name. This article focuses on addressing the problem of universal acceptance of any domains and email ..

According to IDC, the volume of the global cloud infrastructure market in the third quarter of 2018 increased by 47.2%. Analysts estimate that global sales of server equipment, network equipment and s..

DNS is usually not given much attention, but this system plays a crucial role for online business websites, online services, cloud connections, and applications. If DNS fails, end users will not be ab..

One of the largest players in the NAND flash memory and solid-state drives market the Micron company introduced a new SSD family for corporate customers. Devices with laconic names 5200 PRO and 5200 E..

Qualcomm has announced that it is closing the line that deals with the production of processors for the data center. Qualcomm released the Centriq ARM processor in November 2017. The chip had great po..

The growth of peripheral computing is one of the major challenges that many organizations will face in the coming years. Cisco predicts that by 2021 there will be 23 billion connected devices, and Gar..

There are several global Internet projects now, and the implementation of the idea is very different for different companies. We will tell you about the technology that Facebook plans to use. The comp..

What will users prefer? What volumes will HDD have at the beginning of the next decade? How will the storage architecture change? How will new technologies affect the performance requirements of data ..

In early January, AMD made announcement of the future 7-nm Ryzen 3000 processors, based on a fundamentally new Matisse design, but many details about their structure and features remained behind the s..

According to MarketsandMarket, the virtualization market will grow over the next 5 years. As the main drivers of the market, experts point out the demand for specialized software and infrastructure fo..

The main focus of the company is on such technologies as artificial intelligence, peripheral computing, autonomous data centers and intelligent storage.
Autonomous data center. It is about creating a ..

Before signing a contract with the provider, you should decide on a few questions that will help you determine your requirements.
1. Determine your needs and evaluate whether you can handle everything..

Taiwanese company Silicon Motion announced the development and launch of a new NAND memory controller for the release of enterprise-class SS22 SM2270. The development of the new product has become a c..

We are assured that the hardware in the cloud no longer plays a special role, but is it really so?
Standard iron copes well with the task
On the basis of large reserves of mass-class hardware, modern ..

Improving the efficiency of engineering equipment and improving the performance of operating solutions remains a typical challenge facing owners of DCs around the world.
Motivation to improve energy e..

Silicon photonics is end-to-end data transmission through optical channels technology inside the processor, between computer components, between computers, and between data centers promises two things..

Numerous business cases demonstrate the use of cloud platforms as a catalyst for business growth. Low initial investment, rental model, quick and easy start make companies evaluate the applicability o..

The needs of enterprises in cloud services and mobile applications force them to experiment with microservices as a software development method. The architectural style of microservices is an approach..

There are many typical strategies for moving to the cloud from well-known vendors. Cloud moving strategies in the form of ready-made instructions from companies such as Microsoft, Antares solutions, A..

We have already wrote about cybersecurity trends. In 2019, organizations and enterprises will face cyber threats in several key areas.
Information warfare
In recent years, some governments have learne..

Pangnote has already talked about alternative locations for the location of data centers. So already have been launched DC under water, in a windmill and in desert. All companies are chasing the maxim..

A container is an isolated application runtime environment. It includes the application itself, executable files, configuration files and libraries, collected in a single package. This technology grea..

Experts identify three main locations where digital information is generated and processed today: the core, the edge and the end points. The collected data produced in this way constitute the global d..

The business faces hacker attacks regularly every year, month, day. Of course, you will not hear from companies official statements. It is unlikely that anyone will want to admit their own vulnerabili..

Physicists from the Universities of Toronto, Osaki, and Toyama presented the concept of a quantum follower that does not use quantum memory cells and is capable of operating at room temperature. In th..

The idea of using programmable logic in computing devices appeared almost fifty years ago, its practical implementation has been constantly improved in accordance with the development of technology. H..

In 2019, communication service providers will have to behave even more actively, since their main competitive advantages are the technology of centralized management of network connection, high qualit..

Huawei, the largest manufacturer of IT products in East Asia, continues to strengthen its position in the server and communications equipment market for corporate sector, as well as for the small and ..

In October 2018, Xilinx, within the framework of the company’s forum for developers, presented the record-breaking performance of the system built on Alveo’s own accelerated computing and AMD EPYC CPU..

ASUS has announced new records of the performance of its servers. The hardware on the ASUS RS300-E10 server platform is recognized as the most high-performance in the world in terms of demanding compu..

In the face of the exhaustion of IPv4, the only way to continue the development of the Internet will be to use IPv6 addresses. However, this is now fraught with organizational and financial difficulti..

IPv4 is the first major version of the protocol that is used to make a huge part of the Internet work. Of course, 4.3 billion IPv4 is quite a large number, but still it is not enough for all devices a..

The rules of any RIR are developed by the Internet community in order to provide those companies that need IPv4 addresses with the opportunity to continue working with the IPv4 protocol, despite the l..

Regardless of whether you work with video, photo, audio or other data, preserving their safety should be in the first place on your list of priorities. Data security may seem like a daunting task, but..

The convenience of use
The control panel should be simple and clear: with the ability to reboot the servers, remote desktop access and detailed statistics on the load on resources available in a coupl..

The basis of the RAID is the controller. The controller can be built-in or installed additionally external. Often, the integrated controller provides a dedicated servers hosting for free. But it shoul..

Underwriters Laboratories Inc. (UL), specializing in the development, publication and updating of voluntary standards based on consensus in the field of safety, as well as the creation of appropriate ..

What can and should be done
Power usage. There is a lot of information about the reduction in operating costs of a data center is reduced precisely to improving energy efficiency. To measure it, even ..

Basically, this method can afford the giants of the industry. And so far it is used only for individual solutions, because it is given solely for information. A regular user who is looking for a cheap..

It is very important to do the settings of cheap dedicated servers correctly in order to ensure successful operation of your project. You also need to take care of the safe and reliable operation of t..

There are a lot of types of dedicated servers, but choosing the best option. This is a special type of hosting, which is mainly needed for companies that have large projects and non-standard goals, as..

Different projects have different approaches to choosing software. Usually you need a reliable solution with high performance without resource limitations. All projects that are in search of hosting s..

The service of server rental includes the ability to maximize customization, optimize scripts, allocate maximum resources and their flexibility in the process of use, which is an important factor in t..

A huge number of Internet projects use the services of Windows dedicated server rental. The high popularity of this operating system is due to its convenience and flexibility of use. Windows OS allows..

To find out how loaded the server is on the Linux operating system, use the average load value load average. It shows how many processes are currently in the queue to be executed. At high rates, the p..

Every day, the hosting and clouds attracts an increasing number of users. However, the demand for providers working in it is proportionally related to the infrastructure they have: its location, equip..

When developing large Internet projects it is very important to take into account all expenses that will be anyway. One of such items of expenses is the order of hosting services. The calculation of t..

Today, the Internet is very likely that your Linux dedicated server will be under DDoS-attack. Perhaps the theme of your project is such that you will never come across such an attack. But there are a..

In order to decide on the choice of data storage on dedicated servers, it is necessary to conduct testing and analysis of storage parameters. For different projects may require completely different de..

The main requirements for a dedicated hosting server are that it stores a large amount of information, gives constant access to it, does not lose files, and quickly processes requests. Important param..

After you have invested a lot of efforts in the development of your project and a large number of users have begun to visit it, you need to make sure that the hosting meets the increasing requirements..

The best solution in cases where you need to have a powerful hosting with a large number of resources will be the use of a dedicated server. The provider provides the client who ordered this service w..

If you are actively developing your project, there will inevitably come a time when the power of the virtual hosting or server will not be enough to maintain a good website performance. When the numbe..

Virtual hosting of sites means that several sites are simultaneously located on the same server, sharing resources. This is the most inexpensive type of hosting, ideal for small projects: blog, busine..

If your projects require more virtual space and the hosting administrator cannot install the software you need, a dedicated server can be an excellent solution.
Among the many services of the Internet..

If you decide to create a website, and this is far from being the easiest, but filled with various information, you need to store user accounts in large numbers, for example, you decide to create an o..

This is a separate physical machine, all the resources of which are provided to the client. The client receives full administrative access to the management of software and hardware components of the ..

The concept of renting a offshore dedicated server is to provide it to the user for a certain time agreement. The data center provide server rental service and the customer sign a contract, where the ..

Dedicated server attracts with its independence from other users. The equipment is located in the data center, which has a separate power supply, rackspace dedicated server and channel. By renting the..

Now it is impossible to imagine that any company, even a little self-respecting company, has an office on the Internet, namely, its own website. Why are there a company, in our time, any person can cr..

When choosing how to host applications on the server, users are faced with a choice between hosting on a physical or virtual server. Even with the obvious choice in this situation, making the right ch..

Each VPS shares the resources of a physical server, but they are separated from each other. If there are any problems on one VPS server or it consumes too much resources, it will not affect other VPS ..

How to make the project run successfully? But is it one thing to launch a project? After all, it is necessary to ensure its maximum performance at any time of the day or night, regardless of the load...

Here are some technologies that are often used for virtualization of the cheapest VPS servers and consider them in more detail.
OpenVZ is implemented at the operating system level. In this case, all v..

The resources of the physical server (processor, memory, disk space) installed in the DC are divided between several virtual machines. Each such machine is a virtual dedicated server.
The advantages o..

Having root access allows you to install virtually any software on a virtual server, which gives you tremendous flexibility when setting up a server.
The number of sites and databases on a VPS is limi..

Site hosting services are provided by many companies, but the vast majority of them do not tell all the details about their product. Usually only information about the good sides of the service, its a..

Almost every hosting service has a trial period. The client needs him to check the work of the provider and make sure that he has made the right choice. As a rule, in a limited period of time, which u..

Often there are situations when, after placing the project on the Germany VPS server, over time the pages begin to load very slowly. In such cases, you should check what causes the load on your server..

It is difficult to imagine the life of a modern person without a computer and the world wide web, where we all have fun, learn, learn useful and interesting information and, of course, earn. And for t..

Our team decided to rethink the existing offers as a platform for finding hosting services. On the Pangnote platform, the useful tools for monitoring and processing daily technical queries and rating ..

Almost any new Internet project begins its existence with usual shared hosting, with an inexpensive rate and parameters that seem to be sufficient for work. But such hosting will not always be enough ..

Now most of the important information is stored not only on physical servers, but also on a virtual server. In fact, local workstations join a virtual server as a physical server via the Internet. Any..

Any successful site over time requires more and more hardware resources. The flow of visitors creates a serious load, and the growing database consumes more and more processor time to process each req..

Consider briefly the advantages and disadvantages of the most popular and common among them. There are hardware and software types of virtualization for companies offerinf to rent VPS server.
Software..

The main advantages of a secure VPS server in comparison with virtual hosting can be highlighted in the following list:
• Virtual server significantly wins the speed of the site. It provides guarantee..

The main advantage of VPS hosting is the ability to configure almost any service. Such a hosting option is especially beneficial with a large attendance site. VPS hosting guarantees the speed of the r..

The article discusses some of the technologies that are often applicable for virtualization and provides a characteristic for selecting a VPS Linux server.
OpenVZ is implemented at the operating syste..

So, you made a hosting order and you received access to the server. What you need to check and what to look for, first of all, in order to understand if the chosen cheap VPS server India rate is right..

For the design, development, testing and deployment of software products usually require the efforts of a whole team of specialists. The modern standard of joint IT creativity has become remote work w..

Many companies focus on savings. It is difficult for business to work in difficult economic conditions: in fact, companies survive thanks to cost optimization. But the current question is how to reduc..

Companies are beginning to pass enthusiasm for cloud server hosting. They increasingly return tasks and storage resources to their own sites. Newly discovered server vulnerabilities, such as Meltdown ..

VPS hosting is an advanced technology that combines the functionality of a dedicated server with management flexibility. Such a server uses modern virtualization technology, providing the site owner w..

IDC analysts outlined the main issues that organizations will face in 2019 and explained why clouds and hyperconvergence can be sources of additional difficulties and risks. According to estimates, in..

It is very important to think about what you will use for cloud computing, as well as how much your budget allows in terms of server space and efficiency. It is important not to choose the cheapest op..

The SaaS model is the absence of costs for the purchase and maintenance of computer equipment on which you want to install software. The stability of the system is supported by the developer. For SaaS..

A cloud in the network is an optimal solution for storing large amounts of information with the possibility of permanent access, but without the need to carry with you physical media for storing and t..

Unlike the local server, the file server cloud is hosted outside the enterprise, most often in the cloud data centers in the US or the EU. The main load falls on a powerful server in the cloud, while ..

Currently, enterprises and organizations of all sectors of the economy are switching to the widespread use of information technologies based on cloud solutions. Telecom operators seek to win their sha..

Despite the fact that many of the basic structures and concepts of cloud computing existed back in the 1960s, the cloud, as we know it today, was formed only in the early and mid-2000s. Transferring w..

There are two opposing opinions. Supporters of the hardware decision do not trust servers with the allegorical name cloudy. Proponents of cloud solutions, by contrast, advocate the use of virtualizati..

Cloud computing is the process of leasing computing facilities, storage for databases, applications on demand. Roughly speaking, you have the task of processing a large amount of data: this data needs..

Cloud VDS is the same virtual server, but having the ability to increase its resources at the expense of other servers included in the cluster. Actually, such hosting is sometimes called cluster. It s..

Today, cloud solutions are a fairly new application for users. Many, paying tribute to the traditions, prefer to use the usual physical media. At the same time, each type of data storage (Saas) has it..

If an organization uses a cloud based SQL server, then the internal data center that interacts with the cloud system has little control over network security. You can use firewalls, IDS / IDP systems ..

A multi-cloud system can combine and bundle cloud services from different providers. Some implementations of a multi-cloud system allow you to combine cloud resources without orchestration. This multi..

The role of technical support is very important, especially in the case of support of a cloud servers providers. After all, the cloud provider ensures the performance of important IT processes of its ..

In the age of high technology, when completely new, replaced by antediluvian solutions, life is changing radically for the better. The same thing happens in the IT industry: lately the server infrastr..

It is important to understand that the SLA allows you to maintain the efficiency of the business, defining the purpose and duration of cooperation, the schedule of service, payment terms, guarantees a..

Now it does not make sense to buy a cluster of physical servers, since AWS or Azure can order the same capacity as virtual dedicated servers. By resorting to the help of the opensource cloud server, y..

The main feature of the cloud is that at hand you have the full flexibility of various settings, and resources are easily scalable. Thus, using Windows based cloud server you get the opportunity to in..

FinOps is not just an interlayer between developers and the equipment they need, but a person or team who will know where and what is better in terms of tariffs purchased by the company. In fact, thes..

If you have the desire and ability to write competently on the topic of hosting, data centers, ISP and the Internet, if you are a professional in your field of knowledge and want to share your accumul..

Hosters provide servers with a continuous supply of electricity, a stable network connection, protection from force majeure. Refraction they stir in DC. Uninterrupted power supply is guaranteed there ..

Backups take up too much space, but they cannot be deleted, so every administrator will sooner or later think about where to store them.
Where they just do not store backups. Previously, they were eve..

From losing information will save only one thing: backup. Alas, no other effective method has yet been devised. It is important not just to make a backup, but to make it right. In this article, we wil..

Each developing project is faced with the choice of a suitable data storage system. And any such system should provide redundancy, ensuring the safety of information in the event of various kinds of f..

Every day it becomes clearer that to provide backup information on the server is the need number one for any business. And it is good that restoring the entire archive of events, documents and program..

Remote backup
This is the best way to protect data. Most businessmen understand that having copies of files in a safe and secure place is a very good thing. However, most of them never bother to take ..

Standard Proxmox tools allow you not only to back up data, but also to create sets of pre-configured operating system images for quick deployment. This not only helps if necessary to create a new serv..

The effect of encrypting viruses is based on the inattention of users: they themselves launch suspicious programs and open fake documents. Only single antiviruses with special algorithms are able to p..

One of the most important elements in the process of creating and maintaining the functioning of any project is backup. Due to many circumstances, such as: hacking due to the untimely update of the CM..

11 July 2019

Backup as one of the most important elements in the operation of any project

Administrators are divided into those who STILL do not make backups and those who ALREADY make backups. There is always some probability that due to external factors, such as hacking due to untimely u..

Site backup is a copy of all the data online resource. Its regular creation is a guarantee that you can quickly restore your online store, blog or portal in the event of:
• hacker attack or virus infe..

The use of virtual private networks (VPNs) and proxy servers is a form of privacy protection when accessing content on the Internet. Both services perform the same job providing a connection between a..

VPN srvice free have one significant advantage is that they do not need to pay. Is it always justified and what tricks hide free services?
Overview opens up the possibilities of various services for o..

VPN is a virtual private network that provides the freedom and security of work on the web. The main functions of a VPN are to hide your identity and location, to protect the data transmitted and rece..

VPN technology allows you to create separate virtual private networks within existing ones. A private network is called because it is secure and its connection is encrypted. To establish a connection,..

If business units and branches of your company are divided geographically or you need secure mobile access, this VPN setting becomes the ideal solution for your business.
Very often the construction o..

VPN is a surface network closed from external access, therefore, they cannot interfere into it. The only condition is the presence of high speed connections.
Connection is made as a “point” - “point”...

How VPN works?
The principle of operation of such a network is quite simple:
• At first, the IP address changes. As a result, it is impossible to determine where you really go online. For example, whe..

Logs are files that store information about the actions of users or applications that they launch. In addition, they may contain some information about a visitor of an Internet resource, for example, ..

As a frequently used data privacy tool, VPNs are encryption tools that redirect user traffic to remote servers managed by a company or VPN service provider. The goal is to encrypt information and prot..

VPN technology allows you to use the global Internet for laying your private network on top of the global one. This connection is encrypted and in case of interception of important corporate informati..

The safest of all ways to bypass locks and stay on the network on condition of anonymity is the use of virtual private networks or VPN. Data is sent to the server through a special tunnel that is encr..

Since the server through which we get access to a blocked resource is unknown to us there are the following risks:
1. Low Internet connection. If you have a direct connection with a blocked resource, ..

It is impossible to protect oneself from penetration into one’s own life, even in virtual space. Your personal information, as well as passwords, messages and correspondence may become available to ba..

This is a generic name for technologies that allow you to provide one or more network connections (logical network) on top of another network (for example, the Internet). Create VPN for different task..

A VPN can also be organized exclusively by software, without using any additional equipment. On each PC that needs to be combined into a local vpn network, a special program is installed. Then it make..

The tasks solved with the help of VPN are preservation of anonymity and ensuring the security of the user's personal data. Although VPN tunnels reliably encrypt the transmitted data, not every VPN pro..

Before we start creating and configuring a server, let's figure out why it is needed at all. Isn’t it easier to connect to one of the many ready-made services? In fact, your own server has several adv..

Any IT professional is aware of the dangers of using public Wi-Fi networks. Traffic transmitted over public wireless networks of cafes and hotels is not encrypted, so it can be intercepted. One of the..

The tasks solved with the help of VPN are preservation of anonymity and ensuring the security of the user's personal data. Although VPN tunnels reliably encrypt the transmitted data, not every VPN pro..

VPN-technologies are now firmly in everyday life and not only among IT-specialists, but we decided to update a number of old articles, significantly supplementing and expanding the information availab..

If you carefully study the offers of various companies, you will notice that each free package has a small catch. The most common option is traffic restriction. For example, the convenient and friendl..

Once upon a time, VPN was an exclusively paid service, and, moreover, quite expensive. But as the Internet itself became more accessible, the related services became cheaper. Consider the number of co..

When using the Internet in public places: in a cafe; in restaurants; in hotels; in other public places, in any of these places, your anonymity, security, and freedom of surfing are at risk. Here, any ..

Most of us use the Internet daily, for personal or business purposes. Most likely, you did not have problems with various threats. However, the Internet is not as secure as it seems. OK, you have a Wi..

Connecting to a VPN takes place on top of your regular Internet connection. This means that to connect to a VPN network, you need to have a working Internet connection. The main difference between a V..

VPN providers see exactly what goes through their servers. And they obey all the laws in their jurisdiction: in the UK, the VPN provider is considered the carrier, and they may be required to start re..

Recently, many resources write about VPN services and anonymizers. Opera browser developers not only released a free application for using VPNs, but also built a VPN directly into their browser. Inter..

Many have heard about VPN services more than once, and they know that with their help you can get to a site prohibited in your country, increase the level of personal data security, or hide your curre..

When the first domains appeared, the Internet was only in the USA, where everyone spoke English. Therefore, in the domain name system, you can use only Latin characters, she does not understand others..

Renting a VPN server allows you not to worry about the security of your data. All information is transmitted over encrypted channels using SSL key certificates. Virtual service allows you to get full ..

Connecting to a VPN takes place on top of your regular Internet connection. This means that to connect to a VPN network, you need to have a working Internet connection. The main difference between a V..

When the Internet first appeared, there were no domain names. Computers had digital names - IP addresses. To connect to another computer, you needed to know its IP address. For example, 216.58.215.110..

The cost of a domain name directly depends on the zone in which it will be registered. The price varies quite significantly and can range from a couple of hundred to several thousand rubles. It should..

Webmasters will have to learn not only the basics, but also more specific information. For example, what is a DNS domain record, and how to check it? How often are DNS records updated? How can I get s..

Registering a new domain is similar to buying a new phone number - you can get a completely new sequence of numbers, or you can get a number that someone already used before you.
The situation is the ..

Domain hijackers are betting on confusion with registrations. Therefore, it is imperative to know who you are buying the domain from and which company is hosting your site. For example, many users reg..

In this guide, we will discuss some of the fundamental concepts of a domain information system that will help you figure out your DNS setup.
Domain Name System
The domain name system, better known as ..

Blockchain technology is able to improve the operational models of organizations and increase the security of enterprises. However, many executives are still trying to figure out how to successfully u..

Daily there is news that some hacker stole money from bank accounts or hacked celebrity email. This is because information is easy to access. And Blockchain makes information theft impossible. If a ha..

Although blockchain technology is still perceived in the corporate environment as something far removed from the realities of enterprises, the world does not stand still. And blockchain is increasingl..

To register a free domain, you must contact your domain name registrar. The cheapest domains are registered by the registrars we checked, selected on this page. Also, this service can be provided by y..

If your website has a short and easy-to-pronounce name, the potential customer will easily remember it when they see the Internet address on a business card or billboard. You can easily dictate it by ..

Site owners regularly add, edit information on their resource. The relevance, reliability of information is one of the main building blocks in the foundation of site popularity. Sometimes the changes ..

Domain valuation is both art and science. Domain names, as a rule, have certain and measurable data or features on which the assessment is based. For example, the amount of traffic that the domain rec..

On a paid hosting you usually pay for a predefined set of hosting services. It doesn't matter if you use it fully or not. It is unlikely that the hosting provider will lower the price of your hosting ..

The most important thing that distinguishes American hosting from any other is its huge variety. There are thousands of providers in the United States providing a wide range of services, and, accordin..

1. Crowded server
This is one of the most common problems of the web hosting industry (as it relates to shared hosting). Although this is not an inherent problem of shared hosting. Usually this proble..

Choosing a domain name is not just a creative process. The domain name determines the success of the site. Many of our clients were forced to register new domains and incur additional costs due to a n..

The situation when letters ceased to reach your recipients is not the most pleasant and causes a lot of trouble. The most common cause of this is getting IP into the blacklist (IP blacklist or blockli..

IP addresses are allocated based on a specific set of rules called the Internet Protocol Suite.
In the case when the order and integrity of the data is important, it is necessary to apply a high-level..

Surely each of us knows the famous joke “I will find you using your IP!” And laughed at it more than once. Computer technology has been accompanying our life for a long time and no longer seems to be ..

If you have not thought about moving to the next version of the protocol, IPv6, now is the time to do it - and save time and money by avoiding the panic that could happen in the coming months.
In orde..

From time to time, the media really delights with news of the upcoming 5G era. Clients are bribed by the claimed high speed access. The Next Generation Mobile Network Alliance defines the following re..

VPS hosting price is formed based on a variety of factors. Most of the cost of hosting is paid for the various costs of the cloud service provider. That is, the customer, in addition to paying for the..

Level 1: ICANN
Since its founding in 1998, ICANN has been the premier Internet domain name management authority. The organization has developed documents that describe the rights and obligations of co..

Reason 1: Incorrectly selected tariff plan
Each tariff plan on our hosting has its own limitations on resources for CPU and RAM, and accordingly the site can work at a minimum tariff plan more slowly ..

A domain name is, in fact, an analogue of a physical address in reality, since it means a certain location of a web resource on the network. Using a domain name, it becomes possible to identify a webs..

Domain is the name for the site. Agree that it is more convenient to use mysite.com than the IP address 108.162.192.0. And besides, imagine the situation. You placed the site on the hosting server and..

The most important factor in implementing IPv6 is overcoming the limited IPv4 address resources. IPv6 offers an almost unlimited supply of addresses from today's point of view, which is considered as ..

Obviously, the main service of service providers is to provide customers with access to Internet information resources. At the same time, with high probability it can be assumed that by the time exhau..

The work of the Internet is based on technology of packet switching without connection. The packet structure is defined by IP, and each packet contains the IP address of the sender and receiver. The t..

How serious the problems of the transition period depend not only on the type of service providers, but also on the saturation and development of the market in the region. The latter determines the po..

To choose a domain name for a site, you need to start from the name of the company or its line of business. If the name is made up of individual words, then they should be written together or spaces s..

What do you think, for how much can you sell a domain named monalisa.com? Made a number? How close were you to 200 thousand dollars? This is the market value of the given name. And not the most expens..

One of the biggest misconceptions among beginners is that you should host the site on the platform that was used during development, i.e. if you plan to host the project on a server under UNIX, then y..

In theory, all domains free for registration are the same. There is only a slight difference depending on what pricing policy the domain name registrar will set. But since most of the “apt” words, phr..

For the first time, they spoke of the need to develop a new protocol in the early 90's. The twentieth century, when the network that existed at that time began to finally acquire the features of what ..

Exhaustion of IPv4 Address Space is a complex, multifaceted issue. The fact that the old format free addresses have run out does not at all mean that some piece of the global network or all of it sudd..

IPv4 addresses are most often written in the form of four decimal numbers from 0 to 255, separated by a “.” (Dot), for example, 192.168.1.1 (the minimum possible address is 0.0.0.0, the maximum is 255..

There was a lot of talk about the problem of exhaustion of IPv4 addresses back in 2011, when IANA allocated the final 16 millionth block to regional partners. Then the passions subsided, because the c..

In May 2017, several technology companies - including Hewlett-Packard and LinkedIn - formed an alliance to work on the Open19 project. The main objective of the new organization was to standardize the..

For the first time, the VMware Empower conference in isolation from VMworld was held last year, which was caused by increased interest from the partners of the company, to whom this event was oriented..

World vendors are ready to place and already place any systems in their clouds, including those developed by Russian companies. Moreover, truly unlimited possibilities open up before customers. For ex..

GPU developers also release hardware solutions that increase the performance of vGPU clusters. For example, last year Nvidia introduced a new graphics processor for Tesla T4 data centers based on the ..

The view from the client
The reseller business is simple and complex at the same time. It does not require serious investments, even a schoolboy or student, having borrowed $ 10-20 from his dad, can o..

By 2021, single-socket x86 servers will be able to serve 80% of the workloads of enterprise applications - versus 20% in 2018. Why is there so much speed? There are several reasons: a decade of unhurr..

Dr. Jonathan Smith, program manager at the DARPA Information Innovation Office, believes that the true bottleneck for processor bandwidth is the network interface used to connect the machine to an ext..

The first and easiest way to integrate existing equipment, applications, and services with new HCI equipment is through the use of their built-in APIs. Arsenal of such tools is really equipped with so..

Generally speaking, composable architecture is a logical consequence of the development of all previous models. It combines the features inherent in existing solutions in the new solution and aims to ..

A blade server or blade server (from the English blade - “blade”) is a modern solution in server architecture, the ability to significantly reduce the amount of equipment without sacrificing performan..

Bulletproof VPS can be found all over the world. There is no single registry with a complete list of all hosting services, including the countries of their physical location.
Firstly, it is rarely pos..

While everything around is leaving in the clouds, you can be quite comfortable with a couple of servers rustling in the next room or your own data center. In addition, we are aware of situations where..

There are many reasons for the occurrence of such errors. The main ones include:
Incorrect date and time on the device (computer, smartphone, tablet, etc.);
Insecure SSL certificate;
Firewall or antiv..

What to do if you are a small company by the standards of the market and doubt what kind of hosting is best suited for the project: virtual or VPS. Dedicated hosting and Colocation immediately disappe..

All cloud-based organizations face compliance issues. This means the cloud provider must comply with national and international requirements.
It is also important to know what types of data are sent t..

S3 storage is a facility storage service offered by cloud service providers. The main advantage of the solution is the ability to store files of any type, any size, with a high level of reliability an..

When transferring IT infrastructure to the cloud, applications, services and data can be transferred partially, service by service, or completely. Therefore, partial and complete migration is distingu..

A case of a security violation in the data center of a collocation provider will have the same negative consequences for his client as if a similar incident occurred in a data center that he (the clie..

First, you need to perform a series of preparatory work:
Replace all absolute links within the internal linking with relative links. This will eliminate unnecessary problems with the availability of s..

Consider the most popular misconceptions and myths about protecting your sites on the Web.
1) Hackers are aimed exclusively at big business on the Internet.
Many people think that hackers only crack t..

The global exhaustion of IPv4 addresses has been expected for quite some time. And this day has come. The RIPE Regional Internet Registrar, which operates in Europe and Asia, has reported the exhausti..

According to the GDPR, EU citizens have the right to request a copy of their personal data stored on the servers of a company. It has recently become known that this mechanism can be used to collect a..

The number of sites on the global network is constantly growing, as is the desire to profit from this trend. Companies, when deciding to create a site, are often misled by neglecting important points:..

There are thoughts of the harm of tracking cookies if you hide and really nothing. This position certainly does not stand up to criticism.
The main risk of such tracking cookies for users who really h..

Unique design is the design and creation of style of the online store, which fully takes into account all the features of the business and maximally reflects the uniqueness of the brand. This is a dee..

Name columns and tables with simple names
Use one word to name the table instead of two. If you still need to use a few words for the table, use underscores instead of spaces or dots in the title.
If ..

Many webmasters mistakenly believe that protection is not needed for all sites, but only for large, popular, financially successful ones that are among the top search engines. In fact, everyone needs ..

Automation is becoming pervasive, it has affected almost all enterprises, from small to large. The problem that most major technologists (STOs) are faced with is that recently automation processes hav..

Cisco has revealed the details of a technology strategy aimed at building a new Internet - not subject to today's limits on performance, efficiency and power consumption. The long-term strategy of Cis..

Most of us share personal information online every day. From emails and phone numbers to photos and videos. This data is especially attractive for those who want to use it for illegal purposes. Howeve..

The latest “reserves” of IPv4 addresses were put into operation at the end of November. But this does not prevent fraudsters from earning money on them - having become an extremely rare product, such ..

Over the past few years, the degree of automation of enterprises has grown significantly. Most of them are automated to a certain level, trying to reorient staff to more important tasks. However, inve..

The industrial automation market is leading in the development of a number of new technologies, which include augmented reality (AR), 3D printing, robotics, artificial intelligence (AI), cloud-based d..

Next year, IoT will open up new opportunities that will turn the Internet of things into a technology of strategic importance. It will affect all aspects of human life, from improving the main industr..

If we consider the domain name system as a separate country, then the president of this country can be called ICANN (Internet Corporation for Assigned Names and Numbers) - the Corporation for the mana..

Here are five key issues that can arise after migration to the clouds and which every organization should be prepared to solve.
1. Organizational and operational change management. Often the main diff..

Mobile apps are an integral part of both iOS and Android. But maybe it will be over soon. It's all about PWA (Progressive Web Apps). These are web applications built on front-end technologies (HTML, C..

The ICANN Non-Commercial Stakeholders Group (NCSG) has asked ICANN management to submit three items to the .ORG Registration Agreement after it has been sold to Ethos Capital.
Here are three points:
1..

Positive Technologies has released a comprehensive report, "Current Cyber ​​Threats: Q3, 2019," which details the security situation on the World Wide Web.
Experts see a further increase in number of ..

Many experts believe that cloud cover will be in great demand. But Paul Dix, the co-founder of InfluxData, is not so sure. He believes that the work necessary to create such a system will not be attra..

Have you decided to register a domain or transfer a domain from another registrar to us? This article will help you figure out what you need to do. Consider all the points.
General domain registration..

What are the features of the landing page? All the necessary information for the client on one page in one place. It's not scary if the landing is long, the main thing is that it is interesting. If th..

The trade war between the US and China has hit the American tech giants Google and Facebook. It looks like companies will have to accept the loss of the Pacific Light Cable Network (PLCN) submarine co..

In April 2018, Jim Keller joined the Intel team to lead the development of processor architectures. In a recent interview, Jim admitted that he would like to get Intel to design a completely new archi..

Some application scenarios for Edge Computing are in no way connected with centralized computing models; some analysts believe that this technology can be used in a range of computing that has distrib..

According to the chairman of Google's payment services, Caesar Sengupta, the closure of the project is associated with the cheapening of mobile Internet in many markets.
Google is rolling out its Goog..

Data center costs are becoming uneven due to the fact that enterprises show restraint and the cost of infrastructure is increasingly dependent on cloud providers.
It's hard to do business with equipme..

Operators are just starting to look closely at these technologies, their large-scale implementation will begin after 2020. Diesel generators are a problem. Their installation and maintenance are expen..

The initial point for calculating cloud costs may be to increase the operational efficiency of the enterprise, but it should not be a decisive factor. In addition, teams should determine the cloud cov..

This article will cover practical tips on how not to lose your domain. Many site owners are quite careless about domain ownership. But there are times when the domain name of your site can fall into ..

A new stage of development is associated with serverless computing, which does not require connecting / disconnecting servers or providing access to them. Of course, these calculations are still perfo..

In the end of 2019 China's largest chipmaker Loongson unveiled a new generation of improved performance general-purpose processors in Beijing. The processor of the new generation is Loongson 3A4000 an..

Low / no-code solutions
With the advent of cloud and cloud-type solutions, software manufacturers are promoting finished products to the main roles in the business where decisions are made. Providers..

Quantum excellence is defined as a demonstration of the excellence of a quantum computer through its previously impossible calculations at an unbeatable speed and proof that a traditional computer co..

Error 404 is the HTTP status code that the server sends if the requested page does not exist. The two most common causes of 404 errors are:
-deleting web pages or files from the server, or changing t..

The terms composable infrastructure and server disaggregation have won their place in the minds of many IT staff as early as 2018, when the first technology outlines appeared in the industry that wou..

Modern organizations are always looking for ways and means to make their systems more secure and transparent. Blockchain can become a key technological component for creating such solutions. The orig..

Medical workers, politicians and employers unanimously ordered all people to do one thing - to stay at home. They repeat to us over and over again: do not travel, do not appear in crowded places, do ..

Each site on the Internet has a unique address. For the user, it is presented in the form of a meaningful set of letters, for example, yandex.ru, but the global network uses a digital value to denote ..

Today 70% of sites from Google search results have already been “switched” to this type of indexing. The search engine will conduct the final translation to mobile-first indexing for all sites that ar..

The situation when letters ceased to reach your recipients is not the most pleasant and causes a lot of trouble. The most common reason for this is getting IP into the blacklist (IP blacklist or block..

The peripheral environment actually refers to the problem of data management, i.e., the solution of the questions: what data should be stored and which should be discarded after use, which should be a..

In the concept of a closed-loop economy, the most important role is played by renewal, processing and reuse of resources. Data centers are required to follow this concept primarily in terms of the uti..

The organization illegally intercepted BGP routes and acquired scarce IPv4 addresses. Over the course of the year, telecommunications companies tried to stop the activity and hold accountable the orga..

Dr. Jun Murai, founder of the WIDE Project, who served as chairman of the ICANN Root Server System Advisory Committee (RSSAC) for 15 years, announced his intention to sell the project’s 14.7 million I..